Jump to content

tommyq

Active Members
  • Posts

    10
  • Joined

  • Last visited

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

tommyq's Achievements

Newbie

Newbie (1/14)

  1. Hi. Thanks for your reply. Appreciated. I'd trued airodump-ng though not on the Tetra. It doesn't seem to see everything and same for Kismet. From what I've observed and read, it seems there is passive and active scanning between APs and stations. In the passive case, I think the phone is totally silent in this respect until it sees a beacon it recognises from the AP. IF I'm right, then I cant even tell there on WiFi channels let alone any signal strength. Am I missing something? My Samsung phones seem to beacon out in the active mode. Huawei and OnePlus just sit there until they get in range of their expected AP. If thats the case, then I could look for signalling back to the cell tower. That wouldn't help locate a phone I dont think as the range is between 2 and 5 miles from phone to tower. I need to home in on a specific device. Tom.
  2. Why its spam, and why its inappropriate? For the problem I described, I had hoped to use the Tetra or Nano. The question is very much about recon/beaconing and signal strength. (PineAP, Recon, Site Survey) Isnt that in part what the Hak5 kit is about and a forum where you can ask for pointers? If you could be a little more helpful at least as to where you think this should go, I'll gladly oblige. Polite answers please. 😞
  3. Hi. I'm trying to devise a means to quite literally find a phone - perhaps in a field etc. I can see with various tools some makes of phones and even detect how far away they are by seeing the signal strength. However, some phones appear to be silent or perhaps are using random MACs? In my use case I wont know the MAC address of the phone so all I need is to know there is one and how far away it is. I appreciate the range is limited, but thats fine. I've seen old and newish Samsung phones get detected while out of range from their APs. Equally, I've seen Huawei not. What happens for the ones that cant be detected away from their home AP is that as they come in range, I suddenly see them. This is with the likes of airodump-ng, kismet, and from gitgub trackerjacker. On the Tetra, I cant see this 2nd class of phone with Recon, signal strength or site survey modules. I'd tried to use the Tetra with the likes of airodump-ng in parallel to get get the Tetra to respond to probe requests. My assumption if the phone isn't using random MACs is that it is in fact silent until the AP reaches out 1st. Does anybody have any thoughts or way of detecting such devices. My remaining idea is to simply try to detect any 2.4G signals emanating from the phones. Thanks.
  4. Thankyou very much. I'll go and do more digging!!
  5. So Tetra and firmware version 2.7.0. SSL split working fine, but the browser spots the SSLstrip root CA. I'd read about dynamically generates SSL certificates. Does this mean there is hope for MiTM attacks on https and maybe HSTS sites? I suspect not, but it would be fantastic if there was a solution. Else, any other ideas on how to achieve this?
  6. Ha. Many thanks. I've had problems with PIs and PSUs - even the official ones. I think I've had some problems with power and the nano too. Good luck!
  7. If I'm understanding (quite possibly not) and with it being a cyclic thing, it sounds like the sort of thing you get with an IP conflict, where the interface bounces. If not related to this specific issue, may help somebody else coming down this route looking for solutions.
  8. Ah. Thank you very much!! I've been pulling my hair (whats left of it) out.
  9. While looking at this, I saw on GitHub others who were seeing not authorised errors. However, my system seemed to have EvilPortal 3.1. I noticed there was a get from pineapple.com a version 3.2, So I went for this but noticed the info in the portal showed 3.1 still!! Manage modules showing 3.1 but info for the modiule showing 3.1. I removed and installed. Same. So, what is the difference if any between v3.1 from github and 3.2 from pineapple.com and does either fix the now authorized error? Thanks in anticipation. I've tried this with and without the dns set to 127.0.0.1 for the various portal checks like clients3... etc.
  10. I've just updated to the latest firmware from the website today. I can connect to the spoofed wifi as seen in the dashboard and kick back off etc. I have the PineAP running and the Evil Portal running. I dont get trapped into a portal and on the very rare occasion I do, I get a not authorized message after giving some credentials to the login page. It seems there is a great great deal of weirdness going on. I also followed the Windows 10 ICS video and have conformed that my ICS is correct. I've tried also, to tether my laptop to my android phone and then to get a tablet to connect to the 'Starbucks free Wifi' Any help appreciated. It seems like many people are suffering variations on a this theme. I also suspect a bug in the formware in that sometimes I can not stop the portal? I can stop PineAP?
×
×
  • Create New...